MLOps Blog Series Part 4: Testing security of secure machine learning systems using MLOps